Re: Initial implementation of _FORTIFY_SOURCE
- Reply: Tomoaki AOKI : "Re: Initial implementation of _FORTIFY_SOURCE"
- In reply to: Cy Schubert : "Re: Initial implementation of _FORTIFY_SOURCE"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 13 May 2024 18:57:26 UTC
On Mon, May 13, 2024 at 11:09:24AM -0700, Cy Schubert wrote:
> In message <f8000e6b-226b-45f3-a751-aca790f4f8c8@FreeBSD.org>, Kyle Evans
> write
> s:
> > Hi,
> >
> > As of 9bfd3b407 ("Add a build knob for _FORTIFY_SOURCE"), I've imported
> > an initial version of FORTIFY_SOURCE from FreeBSD. FORTIFY_SOURCE is an
> > improvement over classical SSP, doing compiler-aided checking of stack
> > object sizes to detect more fine-grained stack overflow without relying
> > on the randomized stack canary just past the stack frame.
> >
> > This implementation is not yet complete, but we've done a review of
> > useful functions and syscalls to add checked variants of and intend to
> > complete the implementation over the next month or so.
> >
> > Please test _FORTIFY_SOURCE out now by setting FORTIFY_SOURCE=2 in the
> > buildworld env -- I intend to flip the default to 2 when WITH_SSP is set
> > in the next month if nobody complains about serious breakage. I've
> > personally been rolling with FORTIFY_SOURCE=2 for the last three years
> > that this has been sitting in a local branch, so I don't really
> > anticipate any super-fundamental breakage.
>
> Should this trigger a __FreeBSD_version bump?
I would encourage that so to help the ports tree determine
availability of the import.
Additionally, I've enabled _FORTIFY_SOURCE in HardenedBSD base[1] and
ports[2]. For base, it's only set (and to 2 by default) when MK_SSP is
set to yes. In ports, it's set by default except for ports that have
"kmod" in their USES.
Are there any plans to support _FORTIFY_SOURCE in the kernel?
[1]:
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD/-/commit/927fd28755da27c5dd2b1b0d0396c93db585f933
[2]:
https://git.hardenedbsd.org/hardenedbsd/ports/-/commit/3d7dcd284ce3083103edd6b28b3d232abbfeaa63
Thanks,
--
Shawn Webb
Cofounder / Security Engineer
HardenedBSD
Tor-ified Signal: +1 303-901-1600 / shawn_webb_opsec.50
https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc